Sciweavers

210 search results - page 13 / 42
» Privacy Preserving Database Generation for Database Applicat...
Sort
View
TDP
2010
140views more  TDP 2010»
14 years 6 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
15 years 8 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
15 years 11 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
VLDB
2004
ACM
97views Database» more  VLDB 2004»
15 years 5 months ago
CHICAGO: A Test and Evaluation Environment for Coarse-Grained Optimization
Relational OLAP tools and other database applications generate sequences of SQL statements that are sent to the database server as result of a single information request issued by...
Tobias Kraft, Holger Schwarz
AINA
2006
IEEE
15 years 5 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi